In recent years, Las Vegas has become a prototypical smart city. Between its fully autonomous vehicles and its array of IoT sensors, the city aims to embrace innovation without compromising the security of its 650,000 residents and 42 million annual tourists.
Yet local governments know that internet-connected...

Much like private companies, state and local governments of all kinds are going through a digital transformation at an unprecedented pace: migrating sensitive data to the cloud, installing internet-connected infrastructure, and offering services powered by smart devices.
At the same time, cyber-criminals are also...

Browser-based cryptocurrency miners are falling out of favor as virtual currency prices remain low, IBM says. But the company says malware-based miners are coming back, including fileless ones that rely on Powershell. Here's the lowdown.

Over the past year, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques and procedures (TTPs) to maintain persistence and counter incident response efforts.
To better determine how cybercriminals are hiding behind invisibility cloaks to remain...

Is your cybersecurity fit for the future? Read our whitepaper to understand why a multi-layered approach works together to not only provide EDR capabilities but also deliver strong data and cybersecurity for your organization.
Download this whitepaper to learn more about:
Keep cybersecurity simple to manage with...

The endpoint security marketplace is so full of indefensible marketing claims that making an educated decision is increasingly difficult.
This guide will provide clarity by walking you through the key preventative technologies and why you need them. It will also show you how different vendors stack up in...

Legislation introduced last week would give the U.S. Senate's sergeant at arms responsibility to help secure the personal devices and online accounts used by senators and their staff to help ward off cyberattacks and other threats.

When a company plans to make an acquisition, it should conduct a "compromise assessment" to assess whether the organization being purchased has had an undiscovered breach, says Steve Ledzian, CTO for Asia Pacific at FireEye.

The advent of IoT devices and IT/operational technology integration have dramatically expanded the attack surface. And as a result, the definition of threat intelligence is changing, says Vishak Raman of Cisco.

The ISMG Security Report features Chris Painter, commissioner of the Global Commission on the Stability of Cyberspace, discussing cybersecurity policy for the 2020 U.S. elections. Plus, an update on the cost of the Norsk Hydro ransomware attack and the challenges of controlling real-time payments fraud.

Buyer beware: A new study shows used USBs offered for sale on eBay and elsewhere may contain a wealth of personal information that could potentially be used for identity theft, phishing attacks and other cybercrimes.

A decade or more ago, this would have been unthinkable: Microsoft developing an anti-malware platform for macOS. But Windows Defender ATP is now available for Macs via a limited preview. Microsoft says the move will help protect customers running non-Windows machines.

Attackers have hit North Carolina's Orange County with ransomware for the third time in six years. Government officials say IT teams have been working overtime to restore systems, and that no data has been lost.

Aluminum giant Norsk Hydro has been hit by LockerGoga ransomware, which was apparently distributed to endpoints by hackers using the company's own Active Directory services against it. To help safeguard others, security experts have called on Hydro to release precise details of how it was hit.

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.